Saturday, June 22, 2024

Twitter mistakenly suspended its own CEO’s Twitter account

Twitter co-founder and CEO Jack Dorsey found his account on the micro-blogging site briefly suspended Tuesday. For about 30 minutes, starting 8:45 p.m. EST, his account status showed as “suspended.”


Dorsey’s account was restored about half hour later, and at 9:15 p.m. EST, he had around 200 followers. Eventually, all his 3.8 million followers on the social network were restored.

Dorsey later tweeted the suspension was an “internal mistake.” He even joked by posting his first tweet — “just setting up my twttr.”

The service has been slow to suspend people for hate speech and harassment in the past, but is usually quick to remove accounts that post obscene images or videos. Speculating entirely, it could be that Dorsey was the target of a hacking attempt, and his account was taken down to preemptively halt any kind of public performance, while Twitter worked to get it back into his hands.


Twitter generally suspends hacked accounts or those which have been flagged for sending abusive or spam tweets. The social network has been actively suspending accounts recently, including many accounts last week related to the white nationalist “alt-right” movement. The heads of various companies have suffered from hacking in the past. In August this year, Wikipedia co-founder Jimmy Wales’ Twitter account was hacked, while in April 2015, Tesla CEO Elon Musk’s account was hacked.

The company also issued new developer policies Tuesday prohibiting surveillance using the social network.

“We prohibit developers using the Public APIs and Gnip data products from allowing law enforcement — or any other entity — to use Twitter data for surveillance purposes. Period.” Chris Moody, general manager, Data & Enterprise Solutions, posted on the Twitter blog Tuesday.

He further added: “If developers violate our policies, we will take appropriate action, which can include suspension and termination of access to Twitter’s Public APIs and data products.”

Social-media accounts of tech executives are a ripe target for hackers. In July, both Mr. Dorsey’s Twitter and Vine accounts were compromised, and Facebook Inc. Chief Executive Mark Zuckerberg’s accounts on both Twitter and Pinterest were hacked in June.


Latest articles

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from for...

Beware Of Illegal OTT Platforms That Exposes Sensitive Personal Information

A recent rise in data breaches from illegal Chinese OTT platforms exposes that user...

Beware Of Zergeca Botnet with Advanced Scanning & Persistence Features

A new botnet named Zergeca has emerged, showcasing advanced capabilities that set it apart...

Mailcow Mail Server Vulnerability Let Attackers Execute Remote Code

Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to...

Hackers Attacking Vaults, Buckets, And Secrets To Steal Data

Hackers target vaults, buckets, and secrets to access some of the most classified and...

Hackers Weaponizing Windows Shortcut Files for Phishing

LNK files, a shortcut file type in Windows OS, provide easy access to programs,...

New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document

Researchers discovered a new malware loader named SquidLoader targeting Chinese organizations, which arrives as...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles